First published: Fri Mar 26 2021(Updated: )
In all versions of GitLab, marshalled session keys were being stored in Redis.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <13.7.8 | |
GitLab | <13.7.8 | |
GitLab | >=13.8.0<13.8.5 | |
GitLab | >=13.8.0<13.8.5 | |
GitLab | >=13.9.0<13.9.2 | |
GitLab | >=13.9.0<13.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22194 is considered to have a medium severity level due to the potential risk of exposing session keys.
To mitigate CVE-2021-22194, upgrade to GitLab version 13.7.9 or later, or 13.8.6 or later.
CVE-2021-22194 affects GitLab versions prior to 13.7.9, and from 13.8.0 to 13.8.5, as well as from 13.9.0 to 13.9.2.
CVE-2021-22194 does not represent a remote exploit as it requires access to the Redis instance.
CVE-2021-22194 could allow an attacker with access to Redis to access marshalled session keys, compromising user sessions.